Ann Bednarz

Author Archives: Ann Bednarz

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Hyperconverged infrastructure gets its own Gartner magic quadrant

Hyperconvergence is winning over enterprises that are drawn to its potential to ease management, streamline the deployment of new workloads, and optimize infrastructure costs.As much as 20 percent of business-critical applications currently deployed on three-tier IT infrastructure will transition to hyperconverged infrastructure by 2020, predicts Gartner, which recently gave the technology its own magic quadrant.[ Check out our What is hyperconvergence? and learn whether your network and team are up to hyperconverged storage. ] The magic quadrant is Gartner’s signature format for tech market analysis, and in prior years, the research firm tackled hyperconvergence as part of its integrated-systems research.To read this article in full, please click here

Hyperconverged infrastructure gets its own Gartner magic quadrant

Hyperconvergence is winning over enterprises that are drawn to its potential to ease management, streamline the deployment of new workloads, and optimize infrastructure costs.As much as 20 percent of business-critical applications currently deployed on three-tier IT infrastructure will transition to hyperconverged infrastructure by 2020, predicts Gartner, which recently gave the technology its own magic quadrant.[ Check out our What is hyperconvergence? and learn whether your network and team are up to hyperconverged storage. ] The magic quadrant is Gartner’s signature format for tech market analysis, and in prior years, the research firm tackled hyperconvergence as part of its integrated-systems research.To read this article in full, please click here

VMware tackles complexity of multi-cloud environments

VMware has expanded its portfolio of cloud tools to help enterprises improve the manageability of their public cloud and on-premises environments. At the same time, VMware announced the first global expansion of VMware Cloud on AWS, its joint hybrid cloud service with Amazon Web Services.Complexity is on the rise for enterprises as they expand their use of cloud computing – which often is not limited to a single cloud provider. VMware estimates that nearly two-thirds of companies will use two or more cloud service providers in addition to their on-premises data centers.To read this article in full, please click here

VMware tackles complexity of multi-cloud environments

VMware has expanded its portfolio of cloud tools to help enterprises improve the manageability of their public cloud and on-premises environments. At the same time, VMware announced the first global expansion of VMware Cloud on AWS, its joint hybrid cloud service with Amazon Web Services.Complexity is on the rise for enterprises as they expand their use of cloud computing – which often is not limited to a single cloud provider. VMware estimates that nearly two-thirds of companies will use two or more cloud service providers in addition to their on-premises data centers.To read this article in full, please click here

Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products

Performance is critical when evaluating data center intrusion-prevention systems (DCIPS), which face significantly higher traffic volumes than traditional IPSes.A typical IPS is deployed at the corporate network perimeter to protect end-user activity, while a DCIPS sits inline, inside the data center perimeter, to protect data-center servers and the applications that run on them. That requires a DCIPS to keep pace with traffic from potentially hundreds of thousands of users who are accessing large applications in a server farm, says NSS Labs, which recently tested five DCIPS products in the areas of security, performance and total cost of ownership.To read this article in full, please click here

Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products

Performance is critical when evaluating data center intrusion-prevention systems (DCIPS), which face significantly higher traffic volumes than traditional IPSes.A typical IPS is deployed at the corporate network perimeter to protect end-user activity, while a DCIPS sits inline, inside the data center perimeter, to protect data-center servers and the applications that run on them. That requires a DCIPS to keep pace with traffic from potentially hundreds of thousands of users who are accessing large applications in a server farm, says NSS Labs, which recently tested five DCIPS products in the areas of security, performance and total cost of ownership.To read this article in full, please click here

Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products

Performance is critical when evaluating data center intrusion-prevention systems (DCIPS), which face significantly higher traffic volumes than traditional IPSes.A typical IPS is deployed at the corporate network perimeter to protect end-user activity, while a DCIPS sits inline, inside the data center perimeter, to protect data-center servers and the applications that run on them. That requires a DCIPS to keep pace with traffic from potentially hundreds of thousands of users who are accessing large applications in a server farm, says NSS Labs, which recently tested five DCIPS products in the areas of security, performance and total cost of ownership.To read this article in full, please click here

What is a SAN and how does it differ from NAS?

A storage area network (SAN) is a dedicated, high-speed network that provides access to block-level storage. SANs were adopted to improve application availability and performance by segregating storage traffic from the rest of the LAN. SANs enable enterprises to more easily allocate and manage storage resources, achieving better efficiency. “Instead of having isolated storage capacities across different servers, you can share a pool of capacity across a bunch of different workloads and carve it up as you need. It’s easier to protect, it’s easier to manage,” says Scott Sinclair, senior analyst with Enterprise Strategy Group.To read this article in full, please click here

What is NAS and how do NAS servers excel at corralling unstructured data?

Network-attached storage (NAS) is a category of file-level storage that’s connected to a network and enables data access and file sharing across a heterogeneous client and server environment.“Ideally, NAS is platform- and OS-independent, appears to any application as another server, can be brought online without shutting down the network and requires no changes to other enterprise servers,” says research firm Gartner in its definition of NAS. BE SURE NOT TO MISS: What do users really think of all-flash arrays? What is hyperconvergence? Hyperconvergence gathers speed in 2018 Micro-modular data centers set to multiply NAS history: the evolution of network-attached storage NAS evolved from file servers used in the 1980s to provide access to files for network clients. NAS devices typically consist of bundled hardware and software with a built-in operating system, and they typically use industry-standard network protocols such as SMB and NFS for remote file service and data sharing and TCP/IP for data transfer. In an enterprise setting, NAS can allow IT teams to streamline data storage and retrieval while consolidating their server and storage infrastructure.To read this article in full, please click here

What is microsegmentation? How getting granular improves network security

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs Network segmentation isn’t new. Companies have relied on firewalls, virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years. With microsegmentation, policies are applied to individual workloads for greater attack resistance.To read this article in full, please click here

What is microsegmentation? How getting granular improves network security

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs Network segmentation isn’t new. Companies have relied on firewalls, virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years. With microsegmentation, policies are applied to individual workloads for greater attack resistance.To read this article in full, please click here

What is microsegmentation? How getting granular improves network security

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs Network segmentation isn’t new. Companies have relied on firewalls, virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years. With microsegmentation, policies are applied to individual workloads for greater attack resistance.To read this article in full, please click here

Vexata all-flash systems aim to reduce storage latency

Startup Vexata is tackling a vexing problem: how to eliminate input-output bottlenecks in storage fabrics without requiring customers to rearchitect their IT infrastructures.“If you look at the world today, all these IoT environments with [machine learning] and AI ecosystems, where the desire is mass volumes of data that need to be accessed with very high throughputs, at super low latencies and massive scale – how do you do this economically? How do you do it simplistically so that operationally those applications become a reality?” says Ashish Gupta, Vexata’s chief marketing officer. Vexata’s storage software platform “is designed to address this emerging application ecosystem problem.”To read this article in full, please click here

Top 10 data center predictions: IDC

IDG The lifecycle of a data center is measured in decades, yet the tech that’s inside is changing constantly.“Today’s data centers are really out of sync with the equipment that’s inside them. It would be like using the enclosure for a 1984 Macintosh with the current generation of iMac. It just doesn’t jive very well. The power, cooling and space requirements have all morphed,” says Jennifer Cooke, research director for IDC's datacenter trends and strategies teamTo read this article in full, please click here

Top 10 data center predictions: IDC

IDG The lifecycle of a data center is measured in decades, yet the tech that’s inside is changing constantly.“Today’s data centers are really out of sync with the equipment that’s inside them. It would be like using the enclosure for a 1984 Macintosh with the current generation of iMac. It just doesn’t jive very well. The power, cooling and space requirements have all morphed,” says Jennifer Cooke, research director for IDC's datacenter trends and strategies teamTo read this article in full, please click here

Hyperconvergence gathers speed in 2018

IDG Hyperconvergence is on a roll.Enterprises are shifting storage investments from legacy architectures to software-defined systems in an effort to achieve greater agility, easier provisioning and lower administrative costs. Hyperconverged systems – which combine storage, compute and network functionality in a single virtualized solution – are on their radars.Enterprise interest in hyperconverged systems as potential replacements for legacy SAN and NAS storage systems has in turn inspired major storage vendors to make hyperconvergence plays of their own, acquiring startups and building out their offerings.To read this article in full, please click here

1 3 4 5 6 7 12